From draht@suse.de Mon Jun 4 19:17:34 2001 From: Roman Drahtmueller To: bugtraq@securityfocus.com Date: Sun, 3 Jun 2001 14:26:13 +0200 (MEST) Subject: SuSE Security Announcement: gpg/GnuPG (SuSE-SA:2001:020) [The following text is in the "ISO-8859-1" character set] [Your display is set for the "US-ASCII" character set] [Some characters may be displayed incorrectly] -----BEGIN PGP SIGNED MESSAGE----- ______________________________________________________________________________ SuSE Security Announcement Package: gpg/GnuPG Announcement-ID: SuSE-SA:2001:020 Date: Sunday, Jun 3rd 2001 14:00 MEST Affected SuSE versions: 6.3, 6.4, 7.0, 7.1, (7.2) Vulnerability Type: local privilege escalation Severity (1-10): 6 SuSE default package: yes Other affected systems: systems shipping the gpg/GnuPG package Content of this advisory: 1) security vulnerability resolved: gpg problem description, discussion, solution and upgrade information 2) pending vulnerabilities, solutions, workarounds 3) standard appendix (further information) ______________________________________________________________________________ 1) problem description, brief discussion, solution, upgrade information GnuPG (the SuSE package is named "gpg") is a powerful encryption and signing program with a widespread usership in the free software world. It is designed to be a replacement for PGP and conforms to the OpenPGP standard. A format string vulnerability in versions of GnuPG before 1.0.6 has been found. The error occurs when gpg encounters a filename suffix that is not ".gpg" and prints the filename without the suffix as a default to the terminal. The bug allows an attacker to execute arbitrary code as the user calling gpg. Werner Koch, the author of the GnuPG package, states that when the "--batch" commandline option is used (such as when verifying rpm packages, see Section 3 of this announcement, or when used in MUAs (Mail User Agent)), the error cannot occur since this option supresses the printout of the filename on the terminal. There is no temporary workaround for the problem except for the "--batch" commandline option to gpg. We recommend to update the gpg package on all systems where it is installed. As an additional reason to update the package, it should be noted that gnupg 1.0.5 (packages were available on our ftp server) fixed some security-related problems, where one of them could allow an attacker with access to your key ring to compute the private key in considerably less time. We thank Werner Koch, the author of the GnuPG program, for quickly responding to the problem and fish stiqz, Synnergy Networks, for finding and communicating the problem to Werner Koch and to the security community. Please download the update package from locations described below and check the authenticity of the rpm package file using a method as described in section 3) of this security announcement. Please note that the packages for the 7.1 distribution are located on the ftp.suse.com ftp server, the packages for older distributions are on ftp.suse.de. The upcoming SuSE Linux Distribution 7.2 has been officially announced and will be available for our customers these days. The gpg package in version 1.0.6 did not make it into the 7.2 distribution. The update package will be available in the update directory shortly. Use the command `rpm -Uhv file.rpm' to apply the update. i386 Intel Platform: SuSE-7.1 ftp://ftp.suse.com/pub/suse/i386/update/7.1/sec1/gpg-1.0.6-0.i386.rpm 39153126feeddf43a939c89a9b1a33fd source rpm: ftp://ftp.suse.com/pub/suse/i386/update/7.1/zq1/gpg-1.0.6-0.src.rpm 318ebedd094da2063ecaf209a9a686be SuSE-7.0 ftp://ftp.suse.de/pub/suse/i386/update/7.0/sec1/gpg-1.0.6-0.i386.rpm b78951d79a8c9593a9baf14963c2eb61 source rpm: ftp://ftp.suse.de/pub/suse/i386/update/7.0/zq1/gpg-1.0.6-0.src.rpm ea2067aacf9fb45d2a94eba066fdc18b SuSE-6.4 ftp://ftp.suse.de/pub/suse/i386/update/6.4/sec1/gpg-1.0.6-1.i386.rpm 6050bffa597965475a4caf0a5c265c23 source rpm: ftp://ftp.suse.de/pub/suse/i386/update/6.4/zq1/gpg-1.0.6-1.src.rpm 320eff2cc72cad2bce555993fbc7cb61 SuSE-6.3 ftp://ftp.suse.de/pub/suse/i386/update/6.3/sec1/gpg-1.0.6-1.i386.rpm 6050bffa597965475a4caf0a5c265c23 source rpm: ftp://ftp.suse.de/pub/suse/i386/update/6.3/zq1/gpg-1.0.6-1.src.rpm 320eff2cc72cad2bce555993fbc7cb61 Sparc Platform: SuSE-7.1 ftp://ftp.suse.com/pub/suse/sparc/update/7.1/sec1/gpg-1.0.6-0.sparc.rpm 20d3a3d7d65aee48f281edf0ae2f162c source rpm: ftp://ftp.suse.com/pub/suse/sparc/update/7.1/zq1/gpg-1.0.6-0.src.rpm d827d8e68a306c2d7890a5c113d934d3 SuSE-7.0 ftp://ftp.suse.de/pub/suse/sparc/update/7.0/sec1/gpg-1.0.6-0.sparc.rpm fca18e28c3442b16d7aaf614a5bda269 source rpm: ftp://ftp.suse.de/pub/suse/sparc/update/7.0/zq1/gpg-1.0.6-0.src.rpm 797e4f8410e4e4ba159bfc0e3eb7c06c PPC Power PC Platform: SuSE-7.1 ftp://ftp.suse.com/pub/suse/ppc/update/7.1/sec1/gpg-1.0.6-0.ppc.rpm 9c4c27fd13e9d27ac712bb37cdbe1972 source rpm: ftp://ftp.suse.com/pub/suse/ppc/update/7.1/zq1/gpg-1.0.6-0.src.rpm f262178a3b3d92c6382a303c3aba728e SuSE-7.0 ftp://ftp.suse.de/pub/suse/ppc/update/7.0/sec1/gpg-1.0.6-0.ppc.rpm 378dea2eb7b63ca376330f10757c042e source rpm: ftp://ftp.suse.de/pub/suse/ppc/update/7.0/zq1/gpg-1.0.6-0.src.rpm a1815320cc4537bd18f4c361880c9f44 SuSE-6.4 ftp://ftp.suse.de/pub/suse/ppc/update/6.4/sec1/gpg-1.0.5-3.ppc.rpm d76adf2f7ab76454b05202df580a0235 source rpm: ftp://ftp.suse.de/pub/suse/ppc/update/6.4/zq1/gpg-1.0.5-3.src.rpm bc18a284bfee16e96a2ff7f6749b4cd1 AXP Alpha Platform: SuSE-7.1 ftp://ftp.suse.com/pub/suse/axp/update/7.1/sec1/gpg-1.0.6-0.alpha.rpm 68f791f8d03e3afbad5ee12b529ecc3c source rpm: ftp://ftp.suse.com/pub/suse/axp/update/7.1/zq1/gpg-1.0.6-0.src.rpm 41a50ddce1b16fd91627ac6b155426f6 SuSE-7.0 ftp://ftp.suse.de/pub/suse/axp/update/7.0/sec1/gpg-1.0.6-0.alpha.rpm 696989a2d730b1dbf3891f6b14c42be3 source rpm: ftp://ftp.suse.de/pub/suse/axp/update/7.0/zq1/gpg-1.0.6-0.src.rpm c76556d46b5de45349c146cb9b65b526 SuSE-6.4 ftp://ftp.suse.de/pub/suse/axp/update/6.4/sec1/gpg-1.0.6-1.alpha.rpm e56719ef69aee3a6758f43317cd205cb source rpm: ftp://ftp.suse.de/pub/suse/axp/update/6.4/zq1/gpg-1.0.6-1.src.rpm 6e54ae31543db2c70a3b47f4916e7964 SuSE-6.3 ftp://ftp.suse.de/pub/suse/axp/update/6.3/sec1/gpg-1.0.6-2.alpha.rpm 55cb31d055cfaa7e96908391b075550e source rpm: ftp://ftp.suse.de/pub/suse/axp/update/6.3/zq1/gpg-1.0.6-2.src.rpm e19e2ae8c07e813ff00e65a618046974 ______________________________________________________________________________ 2) Pending vulnerabilities in SuSE Distributions and Workarounds: - qpopper SuSE Linux distributions after SuSE-7.1 contain the qpopper in version 4.x.y. According to the Changelogs of Qpopper 4.0.3 (See ftp://ftp.qualcomm.com/eudora/servers/unix/popper/), the versions of qpopper before version 4.0.3 contain a buffer overflow. We are currently investigating if this bug is exploitable and which versions of qpopper are affected. We will provide update packages as soon as possible if necessary. Please see our upcoming security announcements (Section 3 of this announcement)! - netscape Netscape before Version 4.77 contains a bug that allows a remote attacker to store JavaScript code in the comment field of GIF files that are contained in a viewed page. This code can be executed. Update packages for the SuSE Linux distributions 6.3, 6.4, 7.0 and 7.1 can be found on our ftp server at ftp://ftp.suse.com/pub/suse/i386/update/7.1/xap1/netscape-4.77-21.i386.rpm 1e2de825b3386d80a3731760b9e7f323 ftp://ftp.suse.com/pub/suse/i386/update/7.0/xap1/netscape-4.77-21.i386.rpm ftp://ftp.suse.com/pub/suse/i386/update/6.4/xap1/netscape-4.77-21.i386.rpm ftp://ftp.suse.com/pub/suse/i386/update/6.3/xap1/netscape-4.77-21.i386.rpm 13f303944c9ac0863591b03c4eb75501 The packages are gpg-signed. See the section above about downloading and verifying rpm packages. The complexity of the netscape browser suggests by nature that more security related problems will be found, we will not issue a dedicated security announcement for the netscape package any more. Security- inclined users may please see the future security announcements in section 2) for information about security related problems with the netscape package. - pine Most of the supported distributions have pine update packages in the update area of the ftp server that update the pine package to version 4.33. Many vulnerabilities have been found in versions before 4.33, and it is recommended to perform the upgrade. Please note that not all packages have been built yet. See the update directory for your distribution (like i386/update/7.0/n1) for pine-4.33 packages. - dqs dex@raza-mexicana.org has found an exploitable buffer overflow bug in the dsh program from the dqs package on SuSE Linux distributions. To workaround the problem, do "chmod -s /usr/bin/dsh" and change the files /etc/permissions* to reflect the change. If you do not need the dqs package, then deinstall it (rpm -e dqs). We are working on update packages that fix the problem. - samba Insecure temporary file handling is the cause for a new samba version 2.0.9 that can be found as rpm packages in the n1/ directory of your distribution. It is recommended to install the update package if your users have local shell access to your samba server (this bug is not remotely exploitable). We are currently investigating some oddity in the behaviour of the samba package and will send a security announcement as soon as we have clarified the problems. The problems were present in earlier releases/versions of the samba package as well. By consequence, the installation of the update package is of low risk for the functionality of your system. ______________________________________________________________________________ 3) standard appendix: authenticity verification, additional information - Package authenticity verification: SuSE update packages are available on many mirror ftp servers all over the world. While this service is being considered valuable and important to the free and open source software community, many users wish to be sure about the origin of the package and its content before installing the package. There are two verification methods that can be used independently from each other to prove the authenticity of a downloaded file or rpm package: 1) md5sums as provided in the (cryptographically signed) announcement. 2) using the internal gpg signatures of the rpm package. 1) execute the command md5sum after you downloaded the file from a SuSE ftp server or its mirrors. Then, compare the resulting md5sum with the one that is listed in the announcement. Since the announcement containing the checksums is cryptographically signed (usually using the key security@suse.de), the checksums show proof of the authenticity of the package. We disrecommend to subscribe to security lists which cause the email message containing the announcement to be modified so that the signature does not match after transport through the mailing list software. Downsides: You must be able to verify the authenticity of the announcement in the first place. If RPM packages are being rebuilt and a new version of a package is published on the ftp server, all md5 sums for the files are useless. 2) rpm package signatures provide an easy way to verify the authenticity of an rpm package. Use the command rpm --checksig to verify the signature of the package, where is the filename of the rpm package that you have downloaded. Of course, package authenticity verification can only target an uninstalled rpm package file. Prerequisites: a) gpg is installed b) The package is signed using a certain key. The public part of this key must be installed by the gpg program in the directory ~/.GnuPG/ under the user's home directory who performs the signature verification (usually root). You can import the key that is used by SuSE in rpm packages for SuSE Linux by saving this announcement to a file ("announcement.txt") and running the command (do "su -" to be root): gpg --batch; gpg < announcement.txt | gpg --import SuSE Linux distributions version 7.1 and thereafter install the key "build@suse.de" upon installation or upgrade, provided that the package gpg is installed. The file containing the public key is placed at the toplevel directory of the first CD (pubring.gpg) and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de . - SuSE runs two security mailing lists to which any interested party may subscribe: suse-security@suse.com - general/linux/SuSE security discussion. All SuSE security announcements are sent to this list. To subscribe, send an email to . suse-security-announce@suse.com - SuSE's announce-only mailing list. Only SuSE's security annoucements are sent to this list. To subscribe, send an email to . For general information or the frequently asked questions (faq) send mail to: or respectively. =================================================== SuSE's security contact is . The public key is listed below. =================================================== Regards, Roman Drahtmueller . - - | Roman Drahtmüller // "The best way to pay for a | SuSE GmbH - Security Phone: // lovely moment is to enjoy it." | Nürnberg, Germany +49-911-740530 // - Richard Bach | - - ______________________________________________________________________________ The information in this advisory may be distributed or reproduced, provided that the advisory is not modified in any way. SuSE GmbH makes no warranties of any kind whatsoever with respect to the information contained in this security advisory. Type Bits/KeyID Date User ID pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.0.5 (GNU/Linux) Comment: For info see http://www.GnuPG.org mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh 1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+ cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7 tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63 Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+ x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0 Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2 saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o L0oixF12CpkBogQ57vSBEQQAk/GN+ftr7+DBlSoixDDpfRnUk+jApGEt8hCnrnjV nPs/9Cr33+CXLQbILOO7Y5oiPbJdHh45t4E0fKyLVzDerCRFB1swz/mNDxT26DLy sdBV5fwNHTPhxa67goAZVrehQPqJEckkIpYriOaYcKpF3n5fQIZMEfMaHEElQhcX ML8AoJVXDkJYh7vI8EUB8ZURNLZMEECNA/sH0MCnb4Q6ZcRyeZ3+1PHP8hP73b6T epRdLZhaylwVF/iu7uIn62ZUL4//NTOCDY7V63qg4iba/fUbOsWtEnGaiE7mQuAl sSWvRspwRA9/g9rdVf3/JdLJrLmKBTheyG+PSJE3W7cAE4ZWafGxIRCwXhmj3TQn Jn2euqylHRubEQP/aL53NZK0kBdvrKgff6O8Of6tqoss8Dkk55I7QVFSp+My1Dn+ mngQKFejTAgtyo/WmR3wPjQ9HoT2lRiYI2lTRYT4uMdHuwVC3b4DqAKmoy375FER wHkrMVyKBJslv8QtbAWw5A1CAUseaHo+91wmYJ4/4p6YUahqbG/tZyhbxfq0KFN1 U0UgUGFja2FnZSBTaWduaW5nIEtleSA8YnVpbGRAc3VzZS5kZT6IXAQTEQIAHAUC Oe70gQUJA8JnAAQLCgMEAxUDAgMWAgECF4AACgkQqE7a6JyACspfLACffAYA+NM8 NBhyRyH+nTX58CNjwLIAoIx9fj52BJe0xY7WbKoXs1+72b2AiEYEEBECAAYFAjpw XlIACgkQnkDjEAAKq6TczgCgi+ddhWb7+FWcfeE6WwPZccqAHowAnjjtRyGwHLQH r5OTFAYTXi2Wv6jNiQEVAwUQOnBgb3ey5gA9JdPZAQE1pwf/QJ+b34lFBNVUJ7fk /xGJJREt7V12iSafaRzGuH8xWvIz1bb+VARxnnt16FDQ1cDNjoEhCEmcW83Vxp6i JXE9PE8wVA/Yue/bon5JS7J69+UiQ2eq2pudfwljp52lYVM53jgPYEz0q/v3091n lZ8CYkAkN9JDS1lV1gEzJ7J0+POngDpU+lDQT2EC6VKaxeWK8pNt6UFDwICRDQxK nlOoiDvTrdWT7QdJZ4sPv8Qotdw9+tKNbWQ2DqdIRxyTdw9xDfAtcj6mXeQr7852 Lwem1gSKVnEYHZ9g1FTJqVOutY8KhpUc9RfOCRv8XuIxrs4KSbfSF0s8qIRCQelx ufg9AbkCDQQ57vSSEAgAhJHQTejMX+Vr6g1pHDEcusJ63fQ2CfFFE5iE9okH9O7U VCiSfb9CV38dmeHdPCEEjDUWquFYEnvj3WICMtH249t1Ymuf4Du3yRKQ9oXdn/qT Jzlrx9qzjiG3mH7ocwHOgUIwCrZoEdBEVE2n0zPVm+hddwjWWTWXw6pxQz+i9dsN 89xexRV5M9O0bNwCLaNWX2GXeLAkqTK/9EuZy6x2yLxi6du9YYUAXkZpqBhCjtiU XpRoFCdglMznbcAyCk9C2wqb2j/D1Z2BeSBaGCSFkR6pRLebnE17LWcu72Iy+r0z +JecbPiyDpDZj4apn7IC81aNFGi7fNITsHODbwwjiwADBgf/YPvVdzkc8OC7ztac EWCanwylKvxCdKzTDA+DfES6WUYShyiVJvZzRy25LJ5WcK20kzOS6Qv1OrIXiz/p dGy1aKtJZrAnFEsofpmOj8VoqyyFgp/yAGQBp12+mXek7SCZRhuqalDfEMRiWEJ6 J5dLkyShyRDWyPbFh0HXE7QTHN+IKKxxQqNQXL6Z3NSxS61p+5n6BseiDUI39xxk KTFwFrkgUIc5Gs2Or2lhaWvGwSfoCmwbsklszZt6xbU+R0SjFqTvjPWx6eHfqbmN C9WMDdTjGrXDDKXFp2aYlokfN6It9vsbVlGNlOwHt/JjGoPMxW6Xqj0FLA7/Vewg CdXW64hMBBgRAgAMBQI57vSSBQkDwmcAAAoJEKhO2uicgArKSyIAmwUHf/vtKQfc mVg4asR7U6XQl0bAAJ4pO22B5U8UH6IYl2LBCXFqw5+5fA== =rVRn - -----END PGP PUBLIC KEY BLOCK----- -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQEVAwUBOxosAHey5gA9JdPZAQHsygf/ZJ/QnjN5LzpQqYqIU4n5Hd8EqWJN1S83 i4tr+kMJxNqL3E1pXjFOpAxzpqcib5gK8bBsCnlVnjZtUro1eZwhvtZyJZTlBVe/ OO/Vp39Y4LTDXQfTmfl5nqjyVFObcBWI6rYvKxpJgl3mmcsH4HGr0UQXFgg3AnVI +J3TVk2j5pcn7br7XzFFyXzcTc//3PZlKWCNZkajD8JHW1uEuN3OIvojaJhFIvRw bWMtFoX9R7UDByekGFnhO4F7wT36QGvGixnYM9V9/PcrAMprRUQfeey+V3gQrPFZ peUzqm3oT/uWVEldyLyyLbUur3GeIRJweLFYs6OvWYj7BAEXpdsv5w== =doZ/ -----END PGP SIGNATURE-----